Risk | High |
Patch available | YES |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2021-23981 CVE-2021-23982 CVE-2021-23984 CVE-2021-23987 CVE-2021-23991 CVE-2021-23992 CVE-2021-23993 |
CWE-ID | CWE-125 CWE-200 CWE-451 CWE-119 CWE-310 CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Workstation Extension Operating systems & Components / Operating system MozillaThunderbird-translations-other Operating systems & Components / Operating system package or component MozillaThunderbird-translations-common Operating systems & Components / Operating system package or component MozillaThunderbird-debugsource Operating systems & Components / Operating system package or component MozillaThunderbird-debuginfo Operating systems & Components / Operating system package or component MozillaThunderbird Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU51661
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-23981
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition during texture upload of a Pixel Buffer Object in WebGL. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.
MitigationUpdate the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
MozillaThunderbird-translations-other: before 78.9.1-8.20.1
MozillaThunderbird-translations-common: before 78.9.1-8.20.1
MozillaThunderbird-debugsource: before 78.9.1-8.20.1
MozillaThunderbird-debuginfo: before 78.9.1-8.20.1
MozillaThunderbird: before 78.9.1-8.20.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211167-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51662
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-23982
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the way Firefox handles requests to internal hosts. Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections.
MitigationUpdate the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
MozillaThunderbird-translations-other: before 78.9.1-8.20.1
MozillaThunderbird-translations-common: before 78.9.1-8.20.1
MozillaThunderbird-debugsource: before 78.9.1-8.20.1
MozillaThunderbird-debuginfo: before 78.9.1-8.20.1
MozillaThunderbird: before 78.9.1-8.20.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211167-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51664
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-23984
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data. A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing credentials.
MitigationUpdate the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
MozillaThunderbird-translations-other: before 78.9.1-8.20.1
MozillaThunderbird-translations-common: before 78.9.1-8.20.1
MozillaThunderbird-debugsource: before 78.9.1-8.20.1
MozillaThunderbird-debuginfo: before 78.9.1-8.20.1
MozillaThunderbird: before 78.9.1-8.20.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211167-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51667
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-23987
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
MozillaThunderbird-translations-other: before 78.9.1-8.20.1
MozillaThunderbird-translations-common: before 78.9.1-8.20.1
MozillaThunderbird-debugsource: before 78.9.1-8.20.1
MozillaThunderbird-debuginfo: before 78.9.1-8.20.1
MozillaThunderbird: before 78.9.1-8.20.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211167-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU52002
Risk: Low
CVSSv4.0: 0.2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-23991
CWE-ID:
CWE-310 - Cryptographic Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to email encryption.
The vulnerability exists in the way Thunderbird uses the OpenPGP key refresh mechanism while handling the extended validity key period. A remote attacker can send victim an email containing a crafted version of the original key and an invalid subkey and force the application to use the invalid subkey, which will result in failure to encrypt the original email message when sending it.
Update the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
MozillaThunderbird-translations-other: before 78.9.1-8.20.1
MozillaThunderbird-translations-common: before 78.9.1-8.20.1
MozillaThunderbird-debugsource: before 78.9.1-8.20.1
MozillaThunderbird-debuginfo: before 78.9.1-8.20.1
MozillaThunderbird: before 78.9.1-8.20.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211167-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU52004
Risk: Medium
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-23992
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data, when checking if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent.
MitigationUpdate the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
MozillaThunderbird-translations-other: before 78.9.1-8.20.1
MozillaThunderbird-translations-common: before 78.9.1-8.20.1
MozillaThunderbird-debugsource: before 78.9.1-8.20.1
MozillaThunderbird-debuginfo: before 78.9.1-8.20.1
MozillaThunderbird: before 78.9.1-8.20.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211167-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU52003
Risk: Medium
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-23993
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to disable sending of encrypted messages.
The vulnerability exists due to insufficient validation of imported OpenPGP keys. A remote attacker can force the victim to import a specially crafted OpenPGO key with a subkey that has an invalid self signature and prevent users from sending encrypted messages to a correspondent.
Update the affected package MozillaThunderbird to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
MozillaThunderbird-translations-other: before 78.9.1-8.20.1
MozillaThunderbird-translations-common: before 78.9.1-8.20.1
MozillaThunderbird-debugsource: before 78.9.1-8.20.1
MozillaThunderbird-debuginfo: before 78.9.1-8.20.1
MozillaThunderbird: before 78.9.1-8.20.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20211167-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.